Have a personal or library account? Click to login
Decentralization and Federated Approach for Personal Data Protection and Privacy Control Cover

Decentralization and Federated Approach for Personal Data Protection and Privacy Control

Open Access
|Feb 2025

Figures & Tables

Figure 1.

Comparison of centralized and decentralized Approaches
Comparison of centralized and decentralized Approaches

Figure 2.

Decentralized Identity
Decentralized Identity

Figure 3.

Flowchart that encompasses personal data protection and privacy control algorithm.
Flowchart that encompasses personal data protection and privacy control algorithm.

Figure 4.

Decentralized personal data protection
Decentralized personal data protection

Figure 5.

Federated learning process for privacy control
Federated learning process for privacy control

Figure 6.

Working of self-sovereign identities (SSI)
Working of self-sovereign identities (SSI)

Figure 7.

Components of blockchain-based sovereign identity system
Components of blockchain-based sovereign identity system

Comparison of centralized and decentralized Approaches_

Centralized ApproachesDecentralized Approaches
SecurityCentralized systems can implement security measures such as firewalls, encryption, access controls, and intrusion detection systems.Decentralized systems employ cryptographic techniques, consensus mechanisms, and distributed storage to enhance security.
PrivacyIn a centralized model, individuals must trust the central authority to handle their personal data responsibly.Decentralized models often prioritize privacy. Techniques such as pseudonymization, encryption, and privacy-enhancing protocols are employed to protect personal data.
Data ControlIn a centralized model, the central authority has full control over the data, including access, storage, and processing. Individuals have limited control over their data and must rely on the central authority to enforce data protection measures.Decentralized models empower individuals or entities with greater control over their data. Users can decide how and when their data is shared, granting explicit consent for each transaction. They have more autonomy and ownership over their data.
Single Point of FailureCentralized systems have a single point of failure. If the central server or infrastructure fails, the entire system can become inaccessible or non-functional.Decentralized systems distribute data across multiple nodes, eliminating the reliance on a single point of failure. Even if some nodes fail or go offline, the system remains operational, ensuring data availability.
Regulatory ComplianceIn centralized arrangements, ensuring that they comply with data protection laws like GDPR can be challenging. Centralized management of potential and data challenges in implementing data subject rights and consent management can pose compliance risks.Decentralized models can facilitate compliance with data protection regulations. Users have more control over their data, transparent consent management can be implemented, and data minimization and pseudonymization techniques can be utilized.

Centralized and decentralized data management_

Centralized Data ManagementDecentralized Data Management
ArchitectureIn a centralized model, data is stored and managed in a single central location, typically controlled by a central authority or organization.Decentralized data management distributes data across multiple nodes or participants in a network. Each node may have a copy of the entire dataset or a portion of it.
Data ControlThe central authority has full control over the data, including access, storage, and processing.Decentralized models empower individuals or entities with greater control over their data. Users have more autonomy in deciding how their data is shared, accessed, and used.
Data SecurityCentralized systems typically implement security measures to protect data, but a breach or compromise of the central database can lead to widespread data loss or unauthorized access.Decentralized systems employ cryptographic techniques, consensus mechanisms, and distributed storage to ensure data security and integrity. Tampering with data becomes more challenging due to the distributed nature of the system.
ScalabilityCentralized systems may face scalability challenges as the volume of data and the number of users increases. The central server(s) can become a bottleneck, leading to slower performance.Decentralized models can offer better scalability as data and processing are distributed across multiple nodes, allowing for parallelization and efficient resource utilization.
Privacy ConcernsCentralized models raise concerns about privacy as individuals must trust the central authority to handle their data responsibly.Decentralized models often prioritize privacy. Techniques such as pseudonymization, encryption, and privacy-enhancing protocols are employed to protect personal data.
Single Point of FailureCentralized systems have a single point of failure. If the central server or infrastructure fails, the entire system can become inaccessible or non-functional.Decentralized systems are more resilient to failures or attacks since data is redundantly stored across multiple nodes, reducing the impact of a single point of failure.
DOI: https://doi.org/10.2478/ias-2024-0014 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 197 - 213
Published on: Feb 20, 2025
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Suyogita Singh, Satya Bhushan Verma, Bineet Kumar Gupta, Anamika Agrawal, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.